Forensic Monitoring System
|
|
- Camron Baldwin
- 8 years ago
- Views:
Transcription
1 Forensic Monitoring System Technical Report September 2007 Number W0702 Chuah Siang Chee American Institute of CPAs
2 Copyright 2007 by American Institute of Certified Public Accountants, Inc. Forensic Monitoring System 1
3 Forensic Monitoring System Chuah Siang Chee The Forensic Monitoring project was charted with developing a system to identify test items that may have been compromised, and thereby endanger the integrity of the Uniform CPA Examination. This is be done primarily by monitoring the proportion of correct responses for each item across testing windows. This will allow us to monitor the performance of items across time and to identify unusual fluctuations in item performance. If the proportion of correct responses is above and beyond the expected response rate, it would trigger further investigation into the integrity of the items. This would allow us to make a decision on retiring the item from the item pool. Forensic analysis is conducted on the multiple-choice items and simulation items for all sections of the Uniform CPA Examination. The Uniform CPA Examination consists of four sections: audit and attestation (AUD), financial accounting and reporting (FAR), regulation (REG), and business environment and concepts (BEC). Three of the sections (AUD, FAR, and REG) consist of an adaptive multi-stage test (MST) for the multiple choice items, two simulation items, and constructed response items. The BEC currently has multiple choice items that are not administered using an adaptive algorithm. There are no simulation items associated with the BEC presently. Forensic Monitoring System 2
4 Description of System This system was built on a Microsoft Access platform. It combines historical data across all previously administered CBT administrations of the Uniform CPA Examination. Initial data processing is done using SAS to generate text files which are then loaded on the Microsoft Access database. Currently, new data for each window is appended to the database at the end of each test window. The Forensic Monitoring system tracks the proportion of examinees that correctly answer a particular item, or p-value. However, natural fluctuations in the abilities of examinees across test windows as well as restriction of range for multiple choice items because of the adaptive administration confound direct assessment of the proportion correct scores. In order to resolve these limitations, the observed proportion correct scores is contrasted with the expected proportion correct scores in order to determine if scores are within tolerances. The expected proportion correct score is calculated based on the IRT parameters and conditional upon the ability level of the examinee administered the specific test item. Difference scores from the expected minus the observed proportion correct scores allow us to control for natural fluctuations in examinee ability and the range restrictions from multi-stage testing. If ability-adjusted difference scores are not used, the tolerance levels would require a wide range, or increase risk of false positives would occur. This would in turn reduce the sensitivity of the forensic monitoring system to detect security breaches. Data in the Forensic Monitoring System is partitioned according to months. Each test window consists of two months of testing before the item pool is replaced. The rationale for this decision was to detect if examinees might be harvesting items at the beginning of a test window Forensic Monitoring System 3
5 and distributing the information to conspirators later in the test window. By partitioning the first and second month of testing, the system would be able to detect significant compromises in the security of the test if such a situation were to occur. Identification of Suspect Items Identification of suspect items in the Forensic Monitoring software currently requires human interpretation. There are no strict rules as to what dictates a suspect item, we have several constrains proposed for identifying suspect items. 1. Real p-values are significantly higher than expected p-values. 2. Sustained increase of real p-values over expected p-values three or more testing windows. 3. Significant increase in real p-values in the second month of test window. Several charts are provided to track the performance of a particular item across windows. These charts include the expected and observed p-value Also included is the standard error of the p-value. This allows the number of examinees to be taken into consideration when interpretation results and serves as a guide in interpreting if there are significant differences between the expected and observed p-value. The process of identifying suspect items is time consuming because each item must be individually inspected. In order to improve efficiency the Forensic Monitoring software provides several statistics to restrict the list of potential items. These include: 1. The absolute size of the fluctuations in the observed p-value. If there is excessive fluctuation, it may indicate that something has occurred to compromise or change the item from previous administrations. Forensic Monitoring System 4
6 2. The absolute size of the fluctuations in the difference between the expected and observed p-value. This is akin to fluctuations of the observed p-value, but takes into account the fluctuations of ability of examinees. 3. The difference between the expected and the observed p-value for the last window the item was administered in. This is provided in order to limit searches to the current or latest test window. 4. The difference between the first window difference score (which is the difference between expected and observed p-value) and the last window difference score, in which the item was administered. Below are samples of the charts available to interpretation. Figure 1 shows the difference between the expected and observed p-value, and standard error of an item across several test windows. Each data point represents a month of testing. Therefore, 05Q21 represents the first month of testing for the second quarter for the year As we can see from the chart, the difference between the expected and observed p-values is generally within a standard error. There does not appear to be a significant difference between the expected and observed p-value in the example given. Figure 1. Difference Between Expected and Observed P-value and Standard Error of a Test Item by Window Diff Pval Standard Error P-Value Diff Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window Forensic Monitoring System 5
7 Figure 2 shows the expected and observed p-value for a test item across test windows. There does not appear to be a significant deviation between the expected and observed p-value. Interpretation of the observed without the inclusion of the expected p-value would be difficult because the p-value fluctuates considerably in this example. Therefore, including the expected p- value is an important instrument for interpreting results for the Forensic Monitoring system. Figure 2. The Expected P-value and observed P-value of a Test Item by Window PVal Expected P P-Value Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window The Forensic Monitoring system is currently operational. Analysis of the results beginning 04Q2 to the last completed window (05Q4) is complete. Results suggest that there are no significant compromises in test security. A small number of items have been flagged as suspect items, 4 items out of the item pool. Figure 3 illustrates the performance of a particular item that has been identified as suspect. There appears to be a slight increase in the proportion of examinees correctly answering the item over time. Forensic Monitoring System 6
8 Figure 3. Difference Between Expected and Observed P-value and Standard Error of a Suspect Test Item Diff Pval Standard Error P-Value Diff Q31 04Q32 04Q41 04Q42 05Q11 05Q12 05Q31 05Q32 Window However, such small fluctuations do not necessarily mean that the item has been compromised. The p-value is expected to fluctuate to a small degree across windows. In addition, the small number of items that were flagged as suspect items suggests that there is currently no significant compromise to the security of the test. Other Applications In addition identifying items that may be compromised the Forensic Monitoring program has other potential applications. These include the ability to identify items where the current accounting rules pertaining to that item may have changed or to identify inconsistencies between item parameters and data. The Uniform CPA Examination is based on governmental rules that frequently change. Consequently, there is a need to actively perform obsolescence analysis of Forensic Monitoring System 7
9 the items in order to assure that the examination has kept up with the code. If there has been a change and the keyed response is no longer correct, the item statistics for that item might reflect this discrepancy. The system could also be used to study the lifecycle of the item. Indications that an item properties change over time might inform policy decisions about item use and retirement. Schedule of Analysis It is proposed that the Forensic Monitoring analysis be run at the completion of each testing window. This is the most opportune to run the analysis because all item parameters and statistics will be available. It is also the soonest that the analysis can be conducted. Conducting the analysis in the middle of the test window, before the completion of the window would exclude items that might not have their final item parameters. Procedural Recommendations For the Forensic Monitoring program to be effective, there need to be procedures in place to respond once items have been flagged as behaving suspiciously. Below are several recommendations for procedures. Having a second psychometrician to evaluate items already flagged as being suspicious. The identification of suspect items is a subjective process, and having concurrence should improve the process. Once an item is flagged as suspicious, a test developer should review the identified item in order to determine if there is a reason for the behavior of the item statistics. If no Forensic Monitoring System 8
10 acceptable reason can explain the item behavior, the status of the item should be escalated in order to determine an appropriate response. Once an item s status has been escalated, a process needs to be in place to retire an item, or in the extreme case, to not score the item. In order to implement such a process, a senior manager should be designated with the task of approving the decision to permanently/temporarily retire an item, or not to score the item. The procedure also requires that the personnel from content and production be informed if an item has been retired from the item pool. Accordingly, if an item is marked as a do not score, the appropriate personnel from production need to be informed to make the necessary changes to the scoring algorithm. Future Enhancements Future enhancements under development include the analysis by test center. This would enable the system to detect conspiracies that are localized to certain areas or districts. The rationale is that, if there is a local organization that has somehow compromised the security of the test, many of the students would be geographically close. Consequently, test scores for a local test center should be higher than surrounding areas. One current shortcoming of the system is its inability to identify individual examinees that might be cheating. Research is currently under consideration in order to determine a manner in which individual cheaters might be identified. Forensic Monitoring System 9
Summary of Uniform CPA Examination Candidate Test-Taking and Pass-Fail Patterns in the First Ten Windows of Computer-Based Testing (CBT) (04Q2-06Q3)
Summary of Uniform CPA Examination Candidate Test-Taking and Pass-Fail Patterns in the First Ten Windows of Computer-Based Testing (CBT) (04Q2-06Q3) Technical Report September 2007 Number W0705 Yanwei
More informationTO KNOW TO BECOME A CPA IN INDIANA
WHAT YOU NEED TO KNOW TO BECOME A CPA IN INDIANA The CPA Exam will be one of the most challenging tests you will take. But with a solid educational foundation, excellent resources and the dedication to
More informationLOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students.
LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students. Logic is an Authorised Partner of IMA & WILEY. 1 CPA exam is conducted by American
More informationCPA. Certified Public Accountant. Handbook
CPA Certified Public Accountant Handbook CPA Certified Public Accountant What is a CPA A CPA is a certified public accountant who is licensed by a state board of accountancy. To earn the prestige associated
More informationDetecting Cheating in Computer Adaptive Tests Using Data Forensics. James C. Impara, Caveon, Caveon, LLC. Gage Kingsbury, NWEA
Detecting Cheating in Computer Adaptive Tests Using Data Forensics James C. Impara, Caveon, Caveon, LLC Gage Kingsbury, NWEA Dennis Maynes and Cyndy Fitzgerald, Caveon, LLC Key Words: Test security, detecting
More informationMaintaining the Relevance of the Uniform CPA Examination
Invitation to Comment Maintaining the Relevance of the Uniform CPA Examination Issued: September 2, 2014 Comments Due: December 2, 2014 AICPA Board of Examiners Please submit all comments via the online
More informationThe relationship between 150-credit hours, accounting credit hours and CPA pass rates
The relationship between 150-credit hours, accounting credit hours and CPA pass rates ABSTRACT Jason Haen St. Norbert College Amy Spielbauer-Vandenberg St. Norbert College Ariel Bloniarz St. Norbert College
More informationCERTIFIED PUBLIC ACCOUNTANT (CPA)
CERTIFIED PUBLIC ACCOUNTANT (CPA) Certified Public Accountant (CPA) is the highest accounting qualification in the United States of America. One has to pass the Uniform CPA Examination conducted by the
More informationPerformance of HBCUs on the CPA examination for the year 2010
ABSTRACT Performance of HBCUs on the CPA examination for the year 2010 Forrest Thompson Albany State University There are over one-hundred Historically Black Colleges and Universities (HBCUs) in the United
More informationM NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION
M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION 2015/2016 CPA CERTIFICATION THE FUTURE IS SO BRIGHT THE CPA CREDENTIAL WHY IT S IMPORTANT CPAs are taking care of business in every industry and there
More informationConcerning the Start of the Certified Public Accountants and Auditing Oversight Board
Concerning the Start of the Certified Public Accountants and Auditing Oversight Board Chairman of the Certified Public Accountants and Auditing Oversight Board Akira Kaneko 1. Introduction Due to rapid
More informationMAP YOUR WAY TO CPA. What you need to know to become a CPA in Indiana.
MAP YOUR WAY TO CPA What you need to know to become a CPA in Indiana. IRST The CPA Exam will be one of the most challenging tests you will take. But with a solid educational foundation, excellent resources
More informationBecome a CPA. in New Hampshire
Become a CPA in New Hampshire 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the
More informationOverview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate.
Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate. Revised 6.3.15 Overview: The information provided in this brochure is intended to inform Illinois
More informationBecome a CPA. in Pennsylvania. www.picpa.org/cpaexam
Become a CPA in Pennsylvania 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the
More informationLocal outlier detection in data forensics: data mining approach to flag unusual schools
Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential
More informationMICPA. Guide to Becoming A Michigan CPA. Education Examination Experience. Learn more. Sponsored in part by:
MICPA Guide to Becoming A Michigan CPA Education Examination Experience Sponsored in part by: Learn more The 3 E-ssentials for becoming a CPA in Michigan Education + Examination + Experience = MI CPA Completing
More informationMEMBER REGULATION NOTICE SUITABILITY
Contact: Ken Woodard Director, Communications and Membership Services Phone: (416) 943-4602 Email: kwoodard@mfda.ca MR-0069 April 14, 2008 (Revised February 22, 2013) MEMBER REGULATION NOTICE SUITABILITY
More informationcpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW
cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW applying, scheduling and sitting for the cpa exam HOW DO I APPLY FOR THE CPA EXAM? Detailed information on how to apply, including state-by-state
More informationAssessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures December 2005 Copyright 2005 Investment Company Institute. All rights reserved. Information may be abridged and therefore
More informationDevelopment and Validation of the National Home Inspector Examination
Development and Validation of the National Home Inspector Examination Examination Board of Professional Home Inspectors 800 E. Northwest Hwy. Suite 708 Palatine Illinois 60067 847-298-7750 info@homeinspectionexam.org
More informationQUALITY MANAGEMENT SYSTEM REQUIREMENTS
QUALITY MANAGEMENT SYSTEM REQUIREMENTS FOR BUILDERS 2014 400 Prince George s Blvd. Upper Marlboro, MD 20774 800.638.8556 HomeInnovation.com TABLE OF CONTENTS Introduction... iii Notes... iii 1 General...1
More informationComparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment
Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment Randall B. Bunker Murray State University Corey S. Cagle University
More informationCensus 2001 Review and Evaluation
Census 2001 Review and Evaluation November 2003 Data Validation: Executive Summary ONS is carrying out a review and evaluation of the 2001 Census in England and Wales which will culminate in a Data Quality
More informationContinuous Monitoring: Match Your Business Needs with the Right Technique
Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous
More informationWHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
More informationRADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
More informationPension & Health Benefits Committee California Public Employees Retirement System
California Public Employees Retirement System Agenda Item 8 ITEM NAME: Customer Services and Support Performance Update PROGRAM: Customer Services and Support ITEM TYPE: Information EXECUTIVE SUMMARY Delivering
More informationWhat You Need to Know About CELDT Security Forms
TITLE: NUMBER: ISSUER: CELDT Training for Principals and Coordinators and Electronic Submission of Test Security Forms for 2015-16 Cynthia Lim, Executive Director Office of Data and Accountability ROUTING
More informationTHE ARIZONA STATE BOARD OF ACCOUNTANCY
Print Form THE ARIZONA STATE BOARD OF ACCOUNTANCY INFORMATION FOR RE-EXAM APPLICANTS FOR THE UNIFORM CPA EXAMINATION The Arizona State Board of Accountancy (Board) and the National Association of State
More informationBank Secrecy Act Anti-Money Laundering Examination Manual
Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification
More informationDepartment of Accounting & Finance Academic Year 2014-15 Assessment Report
Office of the Provost and Vice President for Academic Affairs Department of Accounting & Finance Academic Year 2014-15 Assessment Report MISSION STATEMENT The Department of Accounting and Finance prepares
More informationSTATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS. BOARD OF ACCOUNTANCY 1511 Pontiac Avenue, #68-1 Cranston, Rhode Island 02920
BOARD OF ACCOUNTANCY Cranston, Rhode Island 02920 APPLICATON FOR CPA CERTIFICATE WITHOUT WRITTEN EXAMINATION To the Rhode Island Board of Accountancy: I hereby make application to be examined by the Rhode
More information2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of CPAs. All right reserved.
More informationEuropean Code for Export Compliance
European Code for Export Compliance EU-CEC European Institute For Export Compliance EU-ECF EU Export Compliance Framework: EU Export Compliance Charter The European Code for Export Compliance EU-CEC 1.
More informationSAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
More informationSafe Passage Online Training Overview. Objectives
Safe Passage Online Training Overview Copyright 2012 Safe Passage International, Inc. All rights reserved. Identify the features and benefits of the Safe Passage Training Management System (TMS). Explain
More informationA RESOLUTION OF THE CITY COUNCILOF THE CITY OF CASTLE PINES, COLORADO ADOPTING A POLICY PERTAINING TO IDENTITY THEFT PREVENTION
RESOLUTION NO.ll-34 A RESOLUTION OF THE CITY COUNCILOF THE CITY OF CASTLE PINES, COLORADO ADOPTING A POLICY PERTAINING TO IDENTITY THEFT PREVENTION WHEREAS, the Federal Trade Commission has adopted new
More informationTRENDS. 2013 TRENDS a
2013 TRENDS in the supply of Accounting Graduates and the Demand for Public Accounting Recruits 2013 TRENDS a By Scott Moore Director, Student and Professional Pathways Academic & Career Awareness TARP
More informationDATA AUDIT: Scope and Content
DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the
More informationTesting Integrity Practices and Procedures for Online and
Testing Integrity Practices and Procedures for Online and Computer based Assessments Wayne J. Camara The College Board NCES Sponsored Symposium ontesting Integrity 2/28/2012 CBT vs Paper Online testing
More informationQuestions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
More informationAsset management firms and the risk of market abuse
Financial Conduct Authority Asset management firms and the risk of market abuse February 2015 Thematic Review TR15/1 TR15/1 Asset management firms and the risk of market abuse Contents 1. Executive summary
More informationFacts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More informationHKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 500
More informationPOLICY: Identity Theft Red Flag Prevention
POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information
More informationBOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701
BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701 Criteria for Evaluation of National Certification Examinations for Recognition from the Board of Nurse
More informationGet. Get. Career Ready.
Get CPA READY. Get Career Ready. The Fox Master of Accountancy If you aspire to become a CPA, the Fox one-year Master of Accountancy (MAcc) program is your bridge to a career in public accounting. We
More informationOptimizing Data Validation!
Paper DH03 Optimizing Data Validation! Andrew Newbigging, Medidata Solutions Worldwide, London, United Kingdom ABSTRACT Much effort goes into the specification, development, testing and verification of
More informationRESOLUTION TO ADOPT IDENTITY THEFT POLICY
RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315
More informationReporting on Controls at a Service Organization
Reporting on Controls at a Service Organization 1529 AT Section 801 Reporting on Controls at a Service Organization (Supersedes the guidance for service auditors in Statement on Auditing Standards No.
More informationAttachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA
Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA This Page Intentionally Left Blank Table of Contents SECTION A: CA INTERVAL DATA VEE RULES 1. INTRODUCTION...
More informationNumber: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
More informationINTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
More informationSpecial Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)
HKSA 600 Issued September 2009; revised July 2010, May 2013, June 2014*, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard
More informationCity of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:
2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT
More informationSTATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR
More informationPerforming Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
More informationBoosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
More informationWhite paper Security Solutions Advanced Theft Protection (ATP) Notebooks
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead
More informationGUIDELINES INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES
GUIDELINES TO INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES STATE AUDITOR Robert R. Peterson 1 GUIDELINES TO CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL
More information2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of. All right reserved.
More informationAUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
More informationWolfsberg Statement on AML Screening, Monitoring and Searching (2009)
Wolfsberg Statement on AML Screening, Monitoring and Searching (2009) 1. Introduction The Wolfsberg Group 1 issued its initial paper examining how financial institutions could develop suitable screening,
More informationI. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
More informationSecurity Services and Investigators Act Provincial Examination Process
Upon completion of an approved or accredited basic security or investigator training course in Alberta, applicants must pass a provincially-administered final exam with a score of not less than 80% in
More informationCERTIFIED PUBLIC ACCOUNTANTS
The Uniform Audit and Accounting Guide for Audits of Architecture and Engineering (A/E) Consulting Firms CERTIFIED PUBLIC ACCOUNTANTS Today s Presenters James A. DeLeo, CPA, MBA, MST Gray, Gray & Gray,
More informationNo filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
More informationCovered Areas: Those EVMS departments that have activities with Covered Accounts.
I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with
More informationINDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE
PREFERRED RELIABILITY PRACTICES PRACTICE NO. PD-ED-1228 PAGE 1 OF 6 INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE Practice: To produce high quality, reliable software, use Independent Verification
More informationFFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program
FFIEC BSA/AML Examination Manual Four Key Components of a Suspicious Activity Monitoring Program 1 2 IDENTIFICATION OF SUSPICIOUS ACTIVITY 3 Unusual Activity Identification Employee Identification Law
More informationRULE 3 EXAMINATIONS (Effective July 18, 2013)
RULE 3 EXAMINATIONS (Effective July 18, 2013) 3.1 SEMESTER HOUR; ACCREDITED COLLEGES, UNIVERSITIES, SCHOOLS AND PROGRAMS; CREDIT FOR COURSES (a) As used in these Rules, a semester hour means the conventional
More informationSMALL BUSINESS QUARTERLY PULSE CHECK
SMALL BUSINESS QUARTERLY PULSE CHECK To make your business #CPAPOWERED, call today and let s get started. 16733-312_CPAPowered_Quarterly Pulse_Check Checklist_final.indd 1 Sound planning is one of the
More informationSelling Telematics Motor Insurance Policies. A Good Practice Guide
Selling Telematics Motor Insurance Policies A Good Practice Guide April 2013 1 INTRODUCTION 1.1 The purpose of the guidance This guidance sets out high-level actions that insurers should seek to achieve
More informationSolvency II Data audit report guidance. March 2012
Solvency II Data audit report guidance March 2012 Contents Page Introduction Purpose of the Data Audit Report 3 Report Format and Submission 3 Ownership and Independence 4 Scope and Content Scope of the
More informationTHE AUDITOR S RESPONSES TO ASSESSED RISKS
SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed
More informationSTATEMENT FROM THE CHAIRMAN
STATEMENT FROM THE CHAIRMAN In an ever-changing global marketplace, it is important for all of us to have an understanding of the responsibilities each of have in carrying out day-to-day business decisions
More informationCode of Professional Responsibilities in Educational Measurement
Code of Professional Responsibilities in Educational Measurement Prepared by the NCME Ad Hoc Committee on the Development of a Code of Ethics: Cynthia B. Schmeiser, ACT--Chair Kurt F. Geisinger, State
More informationediscovery Solution for Email Archiving
ediscovery Solution for Email Archiving www.sonasoft.com INTRODUCTION Enterprises reliance upon electronic communications continues to grow with increased amounts of information being shared via e mail.
More informationDescription of the ICTS Standard Setting Process ILLINOIS CERTIFICATION TESTING SYSTEM (ICTS) 1
Description of the ICTS Standard Setting Process 1 ICTS Test of Academic Proficiency Illinois students are required to pass the ICTS TAP as a prerequisite to entering an Illinois educator preparation program.
More informationElectronic Health Records (EHR) Demonstration Frequently Asked Questions
Demo Goals / Objectives 1. What is the Electronic Health Records Demonstration, and why are you doing it? The Electronic Health Records Demonstration is a five-year demonstration project that will encourage
More informationMaryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012)
Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012) This report has been prepared to review the CPA examination process administered by the Board of Public Accountancy
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationUniversity of Nebraska - Lincoln Identity Theft Prevention Program
I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University
More informationGeneral Rules for the Certification of Management Systems Code: RG
General Rules for the Certification of Management Systems Code: RG Drafted on: 1 April 2012 Effective from: 1 October 2012 TABLE OF CONTENTS CHAPTER TITLE PAGE CHAPTER 1 GENERAL 3 CHAPTER 2 REFERENCE STANDARD
More informationETHICS EDUCATION IN U. S. ACCOUNTING PRACTICE A STATUS REPORT
Allied Academies International Conference page 7 ETHICS EDUCATION IN U. S. ACCOUNTING PRACTICE A STATUS REPORT Homer L. Bates, University of North Florida Bobby E. Waldrup, University of North Florida
More informationFinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now
FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now I. INTRODUCTION On August 25, 2015, the Financial Crimes Enforcement Network ( FinCEN ) proposed
More informationAssessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business
Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business The major: Accounting majors prepare for careers in business and accounting and increasingly
More informationRotherham MBC ANNUAL FRAUD REPORT 2009/10
Rotherham MBC ANNUAL FRAUD REPORT 2009/10 ROTHERHAM MBC ANNUAL FRAUD REPORT 2009/10 C O N T E N T S Page INTRODUCTION 2 PERFORMANCE SUMMARY 2 3 THE COUNCIL S ARRANGEMENTS FOR MANAGING THE RISK OF FRAUD
More informationIdentity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
More informationWisconsin Rural Water Association Identity Theft Prevention Program Compliance Model
Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk
More informationUsing the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions
Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions What is the ETS Proficiency Profile? The ETS Proficiency Profile from ETS is an outcomes assessment of four core
More informationInformation Technology Services (ITS)
Service Level Agreement Between: Information Technology Services (ITS) And Date: current date 2 Signature Page: This agreement is effective as of the date of mutual signing between Information
More information211 CMR: DIVISION OF INSURANCE 211 CMR 23.00: AUDITS OF INSURERS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS FOR YEARS ENDING 1991 AND AFTER
211 CMR 23.00: AUDITS OF INSURERS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS FOR YEARS ENDING 1991 AND AFTER Section 23.01: Authority 23.02: Purpose 23.03: Applicability 23.04: Definitions 23.05: Filing
More informationThe Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 Table of Contents A Short History of SAS 70 Overview of SSAE 16 and ISAE 3402
More informationIntrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
More informationAvoiding Buyer s Remorse with AML Monitoring Software. Implementing Effective and Efficient AML Transaction Monitoring Systems
Avoiding Buyer s Remorse with AML Monitoring Software Implementing Effective and Efficient AML Transaction Monitoring Systems Overview A well-designed transaction monitoring program is an important pillar
More information